☆15Apr 10, 2025Updated 11 months ago
Alternatives and similar repositories for awesome-cybersecurity-MCP
Users that are interested in awesome-cybersecurity-MCP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Apr 12, 2025Updated 11 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- ☆19Apr 28, 2025Updated 11 months ago
- Learn MongoDB from absolute basics.☆61Jan 16, 2026Updated 2 months ago
- ☆67Nov 25, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Sandbox☆21Jan 20, 2026Updated 2 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Burp Plugin to decrypt AES encrypted traffic on the fly☆19May 13, 2021Updated 4 years ago
- Demo application to compare performance of Redis and Valkey using Elasticache.☆20May 13, 2025Updated 10 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Apr 17, 2024Updated last year
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- ☆10Sep 10, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ebook version of Metasploit Unleashed book - http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Secu…☆25Jan 2, 2011Updated 15 years ago
- Lite AI Assistant Chat Bot for interacting with LLMs.☆21Jul 31, 2025Updated 7 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Damned Vulnerable Windows Application☆14Jul 10, 2019Updated 6 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- A simple library to interface with Gwiot 7941E RFID reader☆12Nov 2, 2020Updated 5 years ago
- ☆57Feb 16, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Demo repository for spacelift tutorial.☆40May 16, 2025Updated 10 months ago
- ☆32Feb 20, 2026Updated last month
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- CI/CD Implementation for a demo rust application☆41Jun 7, 2025Updated 9 months ago
- A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18☆19Feb 9, 2026Updated last month
- CyberPreacher cloud project collection☆16Dec 21, 2025Updated 3 months ago
- List of free and checked http, https, socks4 and socks5 proxies☆18Mar 16, 2026Updated last week
- Machines, Sherlocks, Challenges, Season III,IV☆15Apr 17, 2024Updated last year
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆10Jan 17, 2022Updated 4 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Run python from a single exe☆36May 1, 2022Updated 3 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Apr 16, 2025Updated 11 months ago
- ☆15Aug 25, 2023Updated 2 years ago